2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.29
|View full text |Cite
|
Sign up to set email alerts
|

ObliVM: A Programming Framework for Secure Computation

Abstract: We design and develop ObliVM, a programming framework for secure computation. ObliVM offers a domainspecific language designed for compilation of programs into efficient oblivious representations suitable for secure computation. ObliVM offers a powerful, expressive programming language and user-friendly oblivious programming abstractions. We develop various showcase applications such as data mining, streaming algorithms, graph algorithms, genomic data analysis, and data structures, and demonstrate the scalabil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
170
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 233 publications
(172 citation statements)
references
References 38 publications
2
170
0
Order By: Relevance
“…In Section 3, we keep these differences in mind in order to choose the right MPC techniques for each part of the computation. Popular applications used for the empirical evaluation of practical MPC systems include graph algorithms [5,32,42,51,57], data structure algorithms [42,51], string matching and distance algorithms [36,37,66] and AES [3,36,37,66].…”
Section: Multi-party Computationmentioning
confidence: 99%
“…In Section 3, we keep these differences in mind in order to choose the right MPC techniques for each part of the computation. Popular applications used for the empirical evaluation of practical MPC systems include graph algorithms [5,32,42,51,57], data structure algorithms [42,51], string matching and distance algorithms [36,37,66] and AES [3,36,37,66].…”
Section: Multi-party Computationmentioning
confidence: 99%
“…[19] introduces an outsourced secure computation scheme that is secure against active adversaries and uses it to compute Dijkstra's shortest path algorithm. [20] introduces a framework that compiles high-level descriptions into programs that combine secure computation and ORAM and gives speed-ups for Dijkstra's shortest path algorithm. However, the complexities of these algorithms that hide the topology of the graph are too high to scale to the size of the Internet consisting of thousands of nodes.…”
Section: [3] and Other Related Workmentioning
confidence: 99%
“…The aforementioned constructions of MPC are purely theoretical, and protocols for secure computation can require many rounds of interaction and the transformation of massive data between the computing parties. A very productive line of research, e.g., [6,20,[22][23][24][25], has been devoted to positioning MPC as a practical tool and off-the-shelf solution for a wide variety of problems, and to minimize the complexity of the current schemes. Using these recent breakthroughs, the benefits of MPC can be utilized in some real-life applications [26,27].…”
Section: Secure Multi-party Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…In the last few years, researchers have tried to address these needs by proposing different privacy-preserving solutions that enable several data providers to securely store and share their sensitive data in either a centralized or decentralized way [3,11,14,26,28,30,33,39,40,42,49,50]. Yet, despite the acknowledgment and acceptance that most of these solutions have received in the research community of privacy and security, only a few have been converted into concrete operational tools and deployed in the real world [3,14,39].…”
mentioning
confidence: 99%